Solved

SQL Anywhere security

Posted on 1997-11-13
1
314 Views
Last Modified: 2006-11-17
I am wondering if someone could point me to a document that would explain/define what, if any, security is implemented on a Watcom/SQL anywhere database that sits on a laptop.  I am specificly referring to when a person is not connected via LAN/DIAL-UP.  People have suggested that we implement a third party product to encrypt/secure the data.  I don't think this is necessary but I need some information to back this position up.  My thoughts are if you take away the standard logins (ie DBA/SQL) the casual thief would not be able to crack the data.  Any help/comments would be appreciated.

Thanks,

Kevin

0
Comment
Question by:mccax
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 

Accepted Solution

by:
RONY earned 100 total points
ID: 1098073
You're totaly right, the security is stored IN the database. So you change the password of the standard DBA and you create new users and/or groups in your database to whom you can attribute rights for each table, SP, view,etc... if you want.
If you want you can additionaly to that encrypt your database, but you don't need a 3° party product for that. The dbinit utility with the command switch -e does that for you. Remark that encryption slows down performance of the DB
0

Featured Post

Free Tool: Subnet Calculator

The subnet calculator helps you design networks by taking an IP address and network mask and returning information such as network, broadcast address, and host range.

One of a set of tools we're offering as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Let’s face it: one of the reasons your organization chose a SaaS solution (whether Microsoft Dynamics 365, Netsuite or SAP) is that it is subscription-based. The upkeep is done. Or so you think.
If you need a simple but flexible process for maintaining an audit trail of who created, edited, or deleted data from a table, or multiple tables, and you can do all of your work from within a form, this simple Audit Log will work for you.
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…
This is my first video review of Microsoft Bookings, I will be doing a part two with a bit more information, but wanted to get this out to you folks.

696 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question